Please enable JavaScript to use CodeHS

Standards Mapping

for Florida Conceptual Cybersecurity

110

Standards in this Framework

76

Standards Mapped

69%

Mapped to Course

Standard Lessons
SC.912.CC.1.1
Evaluate digital modes of communication and collaboration.
SC.912.CC.1.2
Utilize tools within a project environment to communicate.
SC.912.CC.1.3
Present information and data using presentation software.
  1. AP Computer Science Principles in Python
  2. 14.1 Present a Data-Driven Insight
  3. Data Science with Python
  4. 2.7 Interpret and Present
SC.912.CC.1.4
Create a digital artifact utilizing collaboration, reflection, analysis and iteration.
  1. AP Computer Science Principles in Python
  2. 14.1 Present a Data-Driven Insight
SC.912.CC.2.1
Collaborate to publish information and data for a variety of audiences using digital tools and media-rich resources.
  1. AP Computer Science Principles in Python
  2. 14.1 Present a Data-Driven Insight
  3. Data Science with Python
  4. 3.10 Telling Your Story
  5. 4.7 Business Report
SC.912.CC.2.2
Assess how collaboration influences the design and development of software artifacts.
SC.912.CC.2.3
Evaluate program designs and implementations for readability and usability.
  1. AP Computer Science Principles in Python
  2. 18.1 Intro to Design Thinking
  3. 18.2 Prototype
  4. 18.3 Test
  5. 18.4 Project Prep and Development
SC.912.CC.2.4
Critique the strengths and weaknesses of the collaborative process when creating digital products.
SC.912.CO.1.1
Describe the efficiency and effectiveness of digital tools or resources used for real-world tasks.
SC.912.CO.1.2
Identify and select the file format based on trade-offs.
SC.912.CO.1.3
Select and use the correct file type for specific tasks.
SC.912.CO.1.4
Describe the relationship between drivers, hardware and operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 6.1 Internal Components
SC.912.CO.1.5
Describe the organization of a computer and its principal components.
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
  3. 6.3 Peripheral Devices
  4. 6.4 Storage Options
  5. 6.5 Network Devices
SC.912.CO.1.7
Describe the process of protecting computer hardware from exploitation.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
SC.912.CO.1.8
Describe how the Internet facilitates global communication.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
  3. AP Computer Science Principles in Python
  4. 11.1 Welcome to the Internet
SC.912.CO.1.9
Evaluate the accuracy, relevance, comprehensiveness and bias of electronic information resources.
  1. Fundamentals of Cybersecurity
  2. 1.3 Can All Information Be Trusted?
SC.912.CO.2.1
Explore the function of Basic Input/Output System (BIOS) and Unified Extensible Firmware Interface (UEFI) in a computer.
SC.912.CO.2.2
Explore motherboard variations.
SC.912.CO.2.3
Discuss the central processing unit (CPU).
  1. Fundamentals of Cybersecurity
  2. 6.1 Internal Components
SC.912.CO.2.4
Explore the role of a power supply unit (PSU) in relation to a computer system.
SC.912.CO.2.5
Analyze the purpose of various random-access memory (RAM) speeds and storage sizes.
  1. Fundamentals of Cybersecurity
  2. 6.4 Storage Options
SC.912.CO.2.7
Evaluate various forms of input and output (IO).
  1. Fundamentals of Cybersecurity
  2. 6.3 Peripheral Devices
SC.912.CO.2.8
Evaluate the basic components of wired computer networks.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
  3. AP Computer Science Principles in Python
  4. 11.2 Internet Hardware
  5. 11.8 Sequential, Parallel & Distributed Computing
SC.912.CO.2.9
Evaluate the basic components of wireless computer networks.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
  3. AP Computer Science Principles in Python
  4. 11.8 Sequential, Parallel & Distributed Computing
SC.912.CO.2.11
Investigate the issues that impact network functionality.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
  3. 6.10 Network Communication
  4. AP Computer Science Principles in Python
  5. 11.9 Cybersecurity
SC.912.CO.2.12
Describe common network protocols.
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
  3. 5.7 How Do Websites Work?
  4. 5.8 OSI Model
  5. AP Computer Science Principles in Python
  6. 11.7 Packets and Protocols
SC.912.CO.2.13
Discern how common network protocols are applied by client-server and peer-to-peer networks.
SC.912.CO.2.14
Explore the role of dynamic host control protocol (DHCP) in a networking system.
SC.912.CO.2.15
Analyze the importance of subnetting.
SC.912.CO.2.16
Describe how devices are identified on a network.
  1. Fundamentals of Cybersecurity
  2. 5.5 IP Addresses
  3. AP Computer Science Principles in Python
  4. 11.3 Internet Addresses
SC.912.CO.2.17
Identify similarities and differences between Internet protocol versions.
  1. Fundamentals of Cybersecurity
  2. 5.8 OSI Model
  3. AP Computer Science Principles in Python
  4. 11.7 Packets and Protocols
SC.912.CO.2.18
Examine 2.4 gigahertz (GHz) and 5 gigahertz (GHz) wireless networks.
  1. Fundamentals of Cybersecurity
  2. 6.7 Network Options
SC.912.CO.3.1
Analyze various operating systems.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
SC.912.CO.3.2
Develop criteria for selecting software when solving a specific real-world problem.
SC.912.CO.3.3
Examine the difference between operating system (OS) software and application software.
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
SC.912.CO.3.4
Explain how automated software testing can reduce the cost of the testing effort.
SC.912.CS.1.1
Identify possible risks to maintaining data confidentiality.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
SC.912.CS.1.2
Describe computer security vulnerabilities.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 8.6 Checking for Vulnerabilities
SC.912.CS.1.3
Evaluate computer security vulnerabilities.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 8.6 Checking for Vulnerabilities
SC.912.CS.2.1
Analyze security and privacy issues that relate to computer networks and network connected devices.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
  3. 4.8 Application Security
  4. 8.6 Checking for Vulnerabilities
  5. AP Computer Science Principles in Python
  6. 11.9 Cybersecurity
SC.912.CS.2.2
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity and privacy.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
SC.912.CS.2.3
Apply network security concepts and strategies to real-world simulations.
SC.912.CS.3.1
Investigate ransomware attacks.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
SC.912.CS.3.2
Explore access control rules.
  1. Fundamentals of Cybersecurity
  2. 4.10 System Administration
SC.912.CS.3.3
Analyze the limitations of a program’s temporary storage and the security vulnerabilities.
  1. Fundamentals of Cybersecurity
  2. 8.4 Dev Tools Capture the Flag
SC.912.CS.3.4
Trace the social engineering attack cycle.
SC.912.ET.1.1
Describe the emerging features of mobile devices, smart devices and vehicles.
  1. Fundamentals of Cybersecurity
  2. 1.6 Cybersecurity Essentials
SC.912.ET.1.2
Describe the physical and cognitive challenges faced by users when learning to use computer interfaces.
SC.912.ET.1.4
Examine device-to-device interactions that exclude human input.
SC.912.ET.1.7
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
SC.912.HS.1.1
Identify potential dangers to an individual’s safety and security online.
  1. Fundamentals of Cybersecurity
  2. 1.2 Personal Data and Collection
  3. 1.5 Personal Data Security
  4. AP Computer Science Principles in Python
  5. 11.9 Cybersecurity
SC.912.HS.1.2
Evaluate the consequences of cyberbullying.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.1.3
Determine the consequences of inaction when witnessing unsafe Internet practices.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
  3. 1.4 Cyber Ethics and Laws
  4. 1.7 Common Cyber Attacks and Prevention
SC.912.HS.1.4
Examine the positive outcomes when someone reports suspicious behavior on the Internet.
SC.912.HS.1.5
Evaluate the risks to personal information while accessing the Internet.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
SC.912.HS.1.6
Describe the impact of permissible privacy and security.
  1. Fundamentals of Cybersecurity
  2. 1.5 Personal Data Security
SC.912.HS.1.7
Construct strategies to combat cyberbullying or online harassment.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.1
Discuss the permanency of data on the Internet.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.HS.3.2
Analyze how social media influences the digital footprint of individuals, communities and cultures.
  1. Fundamentals of Cybersecurity
  2. 1.1 Digital Footprint and Responsibility
SC.912.PE.1.1
Write code segments.
  1. AP Computer Science Principles in Python
  2. 1.2 Introduction to Programming With Karel
  3. Mobile Apps
  4. 6.1 Using State to Control Values
SC.912.PE.1.2
Create iterative and non-iterative structures within a program.
  1. AP Computer Science Principles in Python
  2. 1.13 While Loops in Karel
  3. Mobile Apps
  4. 5.1 Recreate a Popular App
SC.912.PE.1.3
Create selection structures within a program.
  1. AP Computer Science Principles in Python
  2. 4.4 If Statements
  3. Mobile Apps
  4. 8.1 Conditionals and State Change
SC.912.PE.1.4
Write a void function that does not return a value.
  1. AP Computer Science Principles in Python
  2. 5.1 Functions and Parameters 1
  3. Data Science with Python
  4. 7.14 Functions
  5. Mobile Apps
  6. 6.4 Using Methods to Update String States
SC.912.PE.1.5
Write a non-void function that will return a value.
  1. AP Computer Science Principles in Python
  2. 5.4 Functions and Return Values 1
  3. Data Science with Python
  4. 7.17 Functions and Return Values
  5. Mobile Apps
  6. 6.4 Using Methods to Update String States
SC.912.PE.1.10
Write programs that validate user input.
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
  3. Mobile Apps
  4. 8.1 Conditionals and State Change
SC.912.PE.1.15
Implement a program using an integrated development environment (IDE) commonly used.
  1. Fundamentals of Cybersecurity
  2. 4.11 Command Line Interface
  3. 6.10 Network Communication
  4. AP Computer Science Principles in Python
  5. 18.4 Project Prep and Development
  6. Data Science with Python
  7. 7.14 Functions
  8. Mobile Apps
  9. 14.1 Build Your Own App
SC.912.PE.1.16
Explain the distinction between a programming language’s standard library and the Application Programming Interface (API).
  1. Data Science with Python
  2. 7.17 Functions and Return Values
SC.912.PE.1.23
Compile, run, test and debug a digital artifact.
  1. AP Computer Science Principles in Python
  2. 18.1 Intro to Design Thinking
  3. 18.2 Prototype
  4. 18.3 Test
  5. 18.4 Project Prep and Development
SC.912.PE.2.3
Compare techniques for analyzing massive data collections.
  1. Data Science with Python
  2. 2.2 Big Data and Bias
  3. Mobile Apps
  4. 10.2 Mapping Through Objects in Arrays
SC.912.PE.3.5
Differentiate automated testing platforms and their uses.
SC.912.PE.3.18
Explain the principles of cryptography.
  1. Fundamentals of Cybersecurity
  2. 2.1 Cryptography: Then, Now, and Future
  3. 2.2 Symmetric Encryption
  4. 2.3 Asymmetric Encryption
  5. AP Computer Science Principles in Python
  6. 8.10 Cryptography
SC.912.PE.3.19
Determine which encryption method is suitable for an intended task.
  1. Fundamentals of Cybersecurity
  2. 2.1 Cryptography: Then, Now, and Future
  3. 2.2 Symmetric Encryption
  4. 2.3 Asymmetric Encryption
SC.912.TI.1.1
Analyze historical trends in hardware and software.
SC.912.TI.1.2
Identify ways to use technology to support lifelong learning.
  1. Fundamentals of Cybersecurity
  2. 16.2 Alternative Learning Opportunities
SC.912.TI.1.9
Evaluate access and distribution of technology in a global society.
  1. Fundamentals of Cybersecurity
  2. 5.9 Impact of the Internet
SC.912.TI.1.10
Analyze technology-related career paths.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 10.1 After Fundamentals of Cybersecurity
SC.912.TI.1.12
Examine the history of networking devices.
  1. Fundamentals of Cybersecurity
  2. 6.5 Network Devices
SC.912.TI.2.1
Research how social media and technology can be used to distort, exaggerate or misrepresent information.
SC.912.TI.2.2
Demonstrate knowledge of the Internet safety policy as it applies to state and district guidelines.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
SC.912.TI.2.3
Recognize the terms and policies associated with the use of public access points.
SC.912.TI.2.4
Explore the legal ramifications of technology use.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. AP Computer Science Principles in Python
  4. 11.11 Creative Credit & Copyright
SC.912.TI.2.5
Describe and model the legal use of modern communication media and devices.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. AP Computer Science Principles in Python
  4. 11.11 Creative Credit & Copyright
SC.912.TI.2.6
Evaluate the impacts of the irresponsible use of information on collaborative projects.
SC.912.TI.2.7
Describe differences between open source, freeware and proprietary software licenses and how they apply to different types of software.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
SC.912.TI.2.8
Evaluate the consequences of misrepresenting digital work as your own.
  1. AP Computer Science Principles in Python
  2. 11.11 Creative Credit & Copyright
SC.912.TI.2.9
Analyze how different categories of software licenses can be used to share and protect intellectual property.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
  3. AP Computer Science Principles in Python
  4. 11.11 Creative Credit & Copyright
SC.912.TI.2.10
Analyze how access to information may not include the right to distribute the information.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
  3. AP Computer Science Principles in Python
  4. 11.11 Creative Credit & Copyright
SC.912.TI.2.11
Utilize citation tools when using digital information.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
SC.912.TI.2.12
Describe legal regulations that govern Internet usage and interaction.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
SC.K12.CTR.1.1
Actively participate in effortful learning both individually and collaboratively.
SC.K12.CTR.2.1
Demonstrate understanding by decomposing a problem.
  1. AP Computer Science Principles in Python
  2. 1.6 Top Down Design and Decomposition in Karel
  3. Mobile Apps
  4. 1.1 Introduction to React Native and Expo
SC.K12.CTR.3.1
Complete tasks with digital fluency.
SC.K12.CTR.4.1
Express solutions as computational steps.
  1. AP Computer Science Principles in Python
  2. 1.6 Top Down Design and Decomposition in Karel
  3. Mobile Apps
  4. 13.1 Intro to Design Thinking
SC.K12.CTR.5.1
Create an algorithm to achieve a given goal.
  1. AP Computer Science Principles in Python
  2. 1.6 Top Down Design and Decomposition in Karel
  3. Mobile Apps
  4. 6.2 Updating State with onPress
SC.K12.CTR.6.1
Differentiate between usable data and miscellaneous information.
  1. Data Science with Python
  2. 4.2 Quality Datasets
  3. Mobile Apps
  4. 10.1 Using Arrays and Indexing to Set State
SC.K12.CTR.7.1
Solve real-life problems in science and engineering using computational thinking.
  1. Mobile Apps
  2. 9.1 Currency Converter
MA.K12.MTR.1.1
Actively participate in effortful learning both individually and collectively.
  1. Mobile Apps
  2. 6.3 Using Mathematical Equations to Update State
MA.K12.MTR.2.1
Demonstrate understanding by representing problems in multiple ways.
MA.K12.MTR.3.1
Complete tasks with mathematical fluency.
  1. Fundamentals of Cybersecurity
  2. 5.2 Bits, Text, and Numbers
MA.K12.MTR.4.1
Engage in discussions that reflect on the mathematical thinking of self and others.
MA.K12.MTR.5.1
Use patterns and structure to help understand and connect mathematical concepts.
MA.K12.MTR.6.1
Assess the reasonableness of solutions.
  1. Mobile Apps
  2. 6.3 Using Mathematical Equations to Update State
MA.K12.MTR.7.1
Apply mathematics to real-world contexts.
  1. Fundamentals of Cybersecurity
  2. 5.2 Bits, Text, and Numbers
ELA.K12.EE.1.1
Cite evidence to explain and justify reasoning.
  1. AP Computer Science Principles in Python
  2. 14.1 Present a Data-Driven Insight
  3. 15.1 The Impacts of Computing
  4. Data Science with Python
  5. 4.7 Business Report
  6. Mobile Apps
  7. 5.1 Recreate a Popular App
ELA.K12.EE.2.1
Read and comprehend grade-level complex texts proficiently.
ELA.K12.EE.3.1
Make inferences to support comprehension.
  1. Mobile Apps
  2. 6.1 Using State to Control Values
ELA.K12.EE.4.1
Use appropriate collaborative techniques and active listening skills when engaging in discussions in a variety of situations.
  1. Mobile Apps
  2. 13.2 Empathy
ELA.K12.EE.5.1
Use the accepted rules governing a specific format to create quality work.
ELA.K12.EE.6.1
Use appropriate voice and tone when speaking or writing.
ELD.K12.ELL.MA.1
English language learners communicate information, ideas and concepts necessary for academic success in the content area of Mathematics.